Security Audit of Safeplug "Tor in a Box".
Anne EdmundsonAnna Kornfeld SimpsonJoshua A. KrollEdward W. FeltenPublished in: FOCI (2014)
Keyphrases
- intrusion detection
- information security
- network security
- information assurance
- security requirements
- security problems
- security issues
- security level
- real time
- security vulnerabilities
- computer security
- data sets
- security policies
- encryption scheme
- intrusion detection system
- cyber security
- security model
- data mining techniques
- security properties
- neural network
- security threats
- security management
- minimum bounding
- database